{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:56:54Z","timestamp":1725487014524},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540417828"},{"type":"electronic","value":"9783540452478"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45247-8_16","type":"book-chapter","created":{"date-parts":[[2007,7,2]],"date-time":"2007-07-02T11:15:18Z","timestamp":1183374918000},"page":"192-205","source":"Crossref","is-referenced-by-count":6,"title":["Micropayments for Wireless Communications"],"prefix":"10.1007","author":[{"given":"DongGook","family":"Park","sequence":"first","affiliation":[]},{"given":"Colin","family":"Boyd","sequence":"additional","affiliation":[]},{"given":"Ed","family":"Dawson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,3,21]]},"reference":[{"key":"16_CR1","unstructured":"Vijay Ahuja, Secure Commerce on the Internet, Academic Press, 1996."},{"key":"16_CR2","unstructured":"Ross Anderson, Harry Manifavas, and Chris Sutherland, \u201cA practical electronic cash system\u201d, Personal Communication, December 1995."},{"key":"16_CR3","unstructured":"ASPeCT, Initial Report on Security Requirements, AC095\/ATEA\/W21\/ DS\/P\/02\/B, February 1996."},{"key":"16_CR4","unstructured":"ASPeCT, Secure billing: evaluation report, AC095\/SAG\/W25\/DS\/P\/16\/ 1, May 1997."},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"K. Buhanal, et al., \u201cIMT-2000: Service Providers\u2019 Perspective\u201d, IEEE Personal Communications, August 1997.","DOI":"10.1109\/98.612272"},{"key":"16_CR6","unstructured":"Marilyn Greenstein and Todd M Feinman, Electronic Commerce: Security, Risk Management and Control, McGraw-Hill, 1999, p. 2."},{"key":"16_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/BFb0055870","volume-title":"Computer Security-ESORICS\u201998","author":"G. Horn","year":"1998","unstructured":"G. Horn and B. Preneel, \u201cAuthentication and payment in future mobile systems\u201d, Computer Security-ESORICS\u201998, Lecture Notes in Computer Science, 1485, 1998, pp. 277\u2013293."},{"key":"16_CR8","unstructured":"Ralf Hauser, Michael Steiner, and Michael Waidner, Micro-Payments based on iKP, IBM Zurich Research Lab. Available as http:\/\/www.zurich.ibm.ch\/Technology\/Security\/publications\/1996\/HSW96.ps.gz"},{"key":"16_CR9","unstructured":"ITU, Recommendation ITU-R M.1223, Evaluation of Security Mechanisms for IMT-2000, 1997."},{"issue":"11","key":"16_CR10","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L. Lamport","year":"1981","unstructured":"L. Lamport, \u201cPassword authentication with insecure communication\u201d, Communications of the ACM, 24(11), 770\u2013771, Nov 1981.","journal-title":"Communications of the ACM"},{"key":"16_CR11","unstructured":"K.M. Martin and C.J. Mitchell, \u201cEvaluation of authentication protocols for mobile environment value-added services\u201d, Journal of Computer Security, to appear. Available online from http:\/\/isg.rhbnc.ac.uk\/cjm\/Chris_Mitchell.htm."},{"key":"16_CR12","unstructured":"A. Mehrota, GSM System Engineering, Artech House, 1997."},{"key":"16_CR13","unstructured":"C.J. Mitchell, \u201cSecurity in Future Mobile Networks\u201d, Second International Workshop on Mobile Multi-Media Communications (MoMuC-2), Bristol, April 1995.Also available online at http:\/\/isg.rhbnc.ac.uk\/cjm\/SIFMW.ZIP ."},{"key":"16_CR14","doi-asserted-by":"crossref","unstructured":"Seshadri Mohan, \u201cPrivacy and Authentication Protocols for PCS\u201d, IEEE Personal Communications, October 1996, pp.34\u201338.","DOI":"10.1109\/98.542236"},{"key":"16_CR15","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1007\/BFb0056997","volume-title":"Intelligence in Services and Networks: Technology for Ubiquitous Telecom Services","author":"K.M. Martin","year":"1998","unstructured":"K.M. Martin, B. Preneel, C.J. Mitchell, H.J. Hitz, G. Horn, A. Poliakova, and P. Howard, \u201cSecure billing for mobile information services in UMTS\u201d,in: S. Trigila, A. Mullery, M. Campolargo, H. Vanderstraeten and M. Mampaey (eds.), Intelligence in Services and Networks: Technology for Ubiquitous Telecom Services (Proceedings of the Fifth International Conference, IS&N 98, Antwerp, Belgium, May (1998), Springer-Verlag (LNCS 1430), pp.535\u2013548."},{"key":"16_CR16","unstructured":"T. Ojanpera and R. Prasad, \u201cIMT-2000 Applications\u201d,in Wideband CDMA for Third Generation Mobile Communication, T Ojanpera and R. Prasad (ed.), Artech House, 1998, pp. 65\u201376."},{"key":"16_CR17","volume-title":"DAIMI PB-495","author":"T. P. Pedersen","year":"1995","unstructured":"T. P. Pedersen, \u201cElectronic payments of small amounts\u201d, DAIMI PB-495, Computer Science Department, Aarhus University, August 1995."},{"key":"16_CR18","unstructured":"S.M. Redl et al., GSM and Personal Communications Handbook, Artech House Publishers, 1998."},{"issue":"1","key":"16_CR19","first-page":"7","volume":"2","author":"R. L. Rivest","year":"1996","unstructured":"R. L. Rivest and A Shamir, \u201cPayWord and MicroMint: Two simple micropayment schemes\u201d, Cryptobytes, Vol. 2No. 1, May 1996, pp7\u201311. Available from http:\/\/theory.lcs.mit.edu\/~rivest","journal-title":"Cryptobytes"},{"key":"16_CR20","doi-asserted-by":"crossref","unstructured":"Jacques Stern and Serge Vaudenay, \u201cSVP: a Flexible Micropayment Scheme\u201d, Financial Crypto\u2019 97, pp.161\u2013171, Springer-Verlag, 1997.","DOI":"10.1007\/3-540-63594-7_76"},{"key":"16_CR21","unstructured":"The Technical Advisory Committee to Develop a Federal Information Processing Standard for the Federal Key Management Infrastructure, Requirements for Key Recovery Products, available at http:\/\/csrc.nist.gov\/keyrecovery ."},{"key":"16_CR22","unstructured":"Peter Wayner, Digital Cash: Commerce on the Net, Academic Press, 2nd Edition, 1997."},{"key":"16_CR23","unstructured":"M. Wiener, \u201cPerformance Comparison of Public-Key Cryptosystems\u201d, Cryptobytes, Vol. 1, No. 2, RSA Laboratories, 1998."}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology \u2014 ICISC 2000"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45247-8_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,29]],"date-time":"2019-04-29T21:25:57Z","timestamp":1556573157000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45247-8_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540417828","9783540452478"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/3-540-45247-8_16","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}